SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1668
Encryption Based Approach to Find Fake Uploaders in Social Media
Shereena T Abdul Rasheed 1, Sadakathulla P.K 2
1MCA student, Centre for Computer Science and Information Technology, University of Calicut, Kerala
2Assistant Professor, Centre for Computer Science and Information Technology, University of Calicut, Kerala
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - In the digital era, we can see rapid growth in
digital contents through different Medias. As we know social
media plays an important role for generating digital contents
using modern electronic devices and sharingof dataandother
digital contents. Digital images are the one of the frequently
used media. In the context we have a challenge to find out the
fake uploaders. In this paper we are proposing a new strategy
to find out such fake uploaders by using encryption based
method. The proposed system uses steganography based
encryption to identify the fake uploaders in an easy way. Here
we embed some personal information In to the digital image
while uploading the content. By using this we can easily find
the individual easily.
Key Words: Encryption, Decryption, Steganography, social
media security, LSB Substitution.
1. INTRODUCTION
In the modern world, there exists a wide range imaging
techniques for capturing, storing and modifying digital
images. With the increase in consumer generated image
content using handheld devices such as mobile cameras and
ease of sharing, fake news via images are spreading rapidly
on social media. There has been a very active research area
in the last decade. Cryptography and steganography can be
used to provide security for digital content. Cryptography
uses mathematics to encrypt and decrypt data to provide
security by transforming plaintext into ciphertext.
Steganography is the art of hiding information in other
information.
With this paper, we mean that along with the photograph,
we also have related meta-data as contact number of the
person who upload that photograph firstly. Here, theperson
behind the photograph can be identified easily by this
application. Identifying person will eliminate the system of
easily spreading the image and this will also act as bigtool to
give evidence in front of justice court. Here we use an
algorithm that hides the contact number of the person who
uploads the image. The contact number that embeddedwith
the image never loses even if it is shared among different
people. Whenever a situation arises to find out the person
who has uploaded the image, we can easily find out the
contact number of the person by just applying the reverse
algorithm.
2. LETERATURE REVIEW
Besides cryptography, steganography can be used to secure
information. Steganography is a technique of hiding
data/information in digital media. Both Cryptography and
steganography methods of digital images are widely used to
protect and frustrate opponents' attacks from unauthorized
access. Thus, image encryption techniques are required to
protect the data [1]. There is a difference between
cryptography and steganography. Cryptography scrambles
messages so that they cannot be understood. On the other
hand, steganography hides the actual messageinanother[2].
Over the last few years, there are many different
steganographic methods areproposed.Mostofthemarevery
simple techniques so that those can be broken easily by
careful analysis of statistical propertiesofthechannel’snoise
[3].Recently,somenewsteganographicalgorithmshavebeen
proposed fortwo-color binaryimages[4].JohnsonandSushil
explain what steganography is and provide a brief history of
steganography, describe how steganography is applied to
hide information in images, and survey a few steganography
software applications [5]. TsungYuan and Wen-Hsiang
proposed a new steganographic method that uses change
tracking technique for hiding data in Microsoft Word
documents [6]. Sinha and Singh proposed a method to
encrypt an image for secure transmission [7].This method
use the digital signature of the image. Digital signatures
enable the recipient of a message to authenticate the sender
and verify that the message isintact.Kisiketal[4]proposeda
steganographic algorithm which embeds a secret message
into bitmap images and palette-based images.
Y.K JainandR.RAhriwalproposedLeastSignificanttechnique
to hide a message in an image. This technique generates a
steganographykeyafterembeddingthemessage.Thekeyhas
different layers. Every layer hasa fixed number of bits.These
bits are embedded in least significant of the image [8].The
method proposed by Mohammad A Ahmed uses Least
Significant technique to hide data in digital image. Then the
digital image will be implemented in hash significant
technique to get the result in hashing value[9].El-Emam
proposed a method which hides message in an image inform
if pixels. To retrieve the hidden message these pixels are
called. Steganography is used to hide and retrieve the
message [10]. Akhtar N, Johri P and Khan S implemented a
variation of traditional Least Significant Bit (LSB) algorithm.
It uses bit inversion method to enhance the quality of the
image which the message is hidden. This method has lesser
modification in pixels compared to traditional LSB method
[11]. P. U. Deshmuk and T. M. Pattewar proposed the edge
adaptive steganography based on LSB substitution method.
They hide secret message in sharp regions of the image.
This technique also improvesthe quality of stego image [12].
D. Baby, J. Thomas, G. Augustine, E. George and N.R. Michael
presented “Novel DWT based image securing method using
steganography”. They proposed a new steganography
technique in which multiple RGB images are embedded into
single RGB image using DWT steganography technique. This
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1669
method has level of PSNR (Peak signal - to - noise ratio) and
structural similarity (SSIM) index values [13]. G. Prashanti
and K. Sandhyarani have done survey on LSB based image
steganography and also two new techniques are presented.
First technique hides secret message in the cover image and
second one embeds a grayscaleimageintoanothergrayscale
image. These two techniques have great security because
secret information is hidden on random selected location of
LSBs of the image [14].
3. LETERATURE REVIEW
The proposed system aims tohidesthecontactnumberofthe
person who uploads the image. The following figure shows
the working of the proposed system.
Fig -1: Working of proposed system
Here we use the Least Significant Bit (LSB) substitution
method to hide the data within the image. This method
replaces the pixels of image by the secret data. The image is
stored as m-by-n matrix having several pixels. Each pixel in
the image is represented as RGB components and that
determine color of each individual pixel. RGB images are
stored as 24 bit format, where the RGB components are of 8
bits each.
Here we use the contact number of the person who uploads
the image and a string as a secret data. The string is used to
check whether theimagealreadycontainanycontactnumber
or not. This secret data is then converted into byte array.
Here we use 3 bit of R, 3 bit of G and 3 bit of B to hide 1 byte
of string. Here we replace first some pixels of the image and
the length of the secret data determines the number of pixels
to be replaced. This results only asmall changeinthevalueof
RGB component, which human eyes can’t detect.
Whenever any situationarises,thereversealgorithmhelpsto
identify the contact number of thepersonwhofirstlyuploads
the image. This secret data will not loss even if it shared by
different people.
3.1 Algorithm to hide data
Step 1: Load image into a variable ‘image’.
Step 2: Check whether the image is already contains any
contact number or not by reverse algorithm.
Step 3: If the image does not contain any numberthenchecks
the mode of image.
Step 4: If the image is an RGB image then store the secret
message into a variable ‘msg’ and set,
length= len(msg)
width, height= image . size
index= 0
encoded= image.copy()
Step 5: Repeat the following steps 6 to 8 until reachesthelast
pixel
Step 6: Store RGBcomponentof 1 pixel into variables r, gand
b
Step 7: if index < length then
c= msg[index]
imsg= int (ord(c))
r1= imsg & 7
imsg= imsg >> 3
g1=imsg & 7
imsg= imsg >> 3
b1=imsg & 7
r= r & 248
g= g & 248
b= b & 252
r= r | r1
g= g | g1
b= b| b1
Step 8: encode.putpixel((col,row),(r,g,b)) index= inex+1
Step 9: Stop
3.2 Algorithm to retrieve data
Step 1: Load image into a variable ‘image’
Step 2: Check whether the image is already contains any
contact number or not
Step 3: If the image does not contain any numberthenchecks
the mode of image
Step 4: If the image is an RGB image then store the secret
message into a variable ‘msg’ and set ,
width, height= image . size
index= 0
Step 5: Repeat the following steps 6 to 8 until reachesthelast
pixel
Step 6: Store RGBcomponentof 1 pixel into variables r, gand
b
Step 7: if index < length then
r1= r & 7
g1= (g & 7) << 3
b1= (b & 3) << 6
val = r1 | g1 | b1
msg = msg + (str ( chr ( val ) ) )
Step 8: index= inex+1
Step 9: Stop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1670
4. CONCLUSION
We have studied about the spreading of fake news through
social media and this project aims to control these
fraudulent activities. We have used LSB substitution
algorithm to hide the secret data within the image. This
method is very simple and we can easily extract contact
number from the image by just applying the reverse
algorithm. We have tested our solutionona samplenetwork.
This method proves that it is possible to extract the contact
number of the uploader even if it shared many times.
REFERENCES
[1] H. Zenon, V. Sviatoslav, R.Yuriy, "Cryptography and
steganography of video information in modern
communications," 1998,
Citeseer.ist.psu.edu/hrytskiv98cryptography.html
[2] M.M. Amin, M. Salleh, S. Ibrahim, M.R Katmin, M.Z.I.
Shamsuddin, "Informationhidingusingsteganography,"
Telecommunication Technology, 2003. NCTT 2003
Proceedings. 4th National
[3] Elke, Fraz, "Steganography preserving statistical
properties," proceeding of the 5th internationally
Workshop oninformationHiding,Noordwijkerhout,The
Netherlands, October 2002, LNCS 2578, Springer 2003,
pp. 278-294.
[4] EE. Kisik Chang, J. Changho, L. Sangjin, "High Quality
Perceptual Steganographic Techniques," Springer, Vol.
2939, 2004, pp.518-531.
[5] N.F. Johnson, J. Suhil, " Exploring Steganography:Seeing
the Unseen," Computing practices, 2006, 2006,
http://www.jjtc.com/pub/r2026.pdf
[6] L. Tsung-Yuan, T. Wen-Hsiang ,"A New Steganographic
Method for Data Hiding in Microsoft Word Documents
by a ChangeTracking Technique," InformationForensics
and Security, IEEE Transactions on Vol.2,Issue1,March
2007 Page(s):24 – 30, Digital Object Identifier
10.1109/TIFS.2006.890310.
[7] A. Sinha, K. Singh, "A technique for image encryption
using digital signature," Source:OpticsCommunications,
vol.218, no. 4, 2003, pp.229-234.
[8] Y. K. Jain and R. R. Ahirwal, “A Novel Image
Steganography Method With Adaptive Number of Least
Significant Bits Modification Based on Private Stego-
Keys”, International Journal of Computer Science and
Security (IJCSS), vol. 4, (2010) March 1.
[9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O.
Alhussainan, “Achieving Security for Images by LSB and
MD5”, Journal of Advanced Computer Science and
Technology Research, Vol. 2, Issue No.3, Pages No. 127-
139, Sept., 2012.
[10] N.N. El-Emam, Hiding a large amount of data with high
security using steganography algorithm, Journal of
Computer Science 3 (2007) 223-232.
[11] Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security
and Quality of LSB Based Image Steganography,"
Computational Intelligence and Communication
Networks (CICN), 2013 5th International Conferenceon
, vol., no., pp.385,390, 27-29 Sept. 2013.
[12] P.U. Deshmukh and T.M. Pattewar, “A Novel Approach
for Edge Adaptive Steganography on LSB Insertion
Technique” IEEE International Conference on
Information Communication and Embedded Systems
(ICICES), Feb. 2014, pp. 1-5.
[13] D. Baby, J. Thomas, G. Augustine, E. George, N.R.Michael,
“ A Novel DWT based Image Securing method using
Steganography”, International Conference on
Information and Communication Technologies (ICICT),
Procedia Computer Science, April 2015, pp. 612-618.
[14] G. Prashanti, K. Sandhyarani, “A New Approach for Data
Hiding with LSB Steganography”, Emerging ICT for
Bridging the Future - Proceedings of the 49th Annual
Convention of the Computer Society of India CSI,
Springer 2015, pp. 423-430.

More Related Content

What's hot

Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 

What's hot (19)

Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
D0341829
D0341829D0341829
D0341829
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Similar to IRJET- Encryption based Approach to Find Fake Uploaders in Social Media

Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganographyrahulmonikasharma
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...IRJET Journal
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 

Similar to IRJET- Encryption based Approach to Find Fake Uploaders in Social Media (20)

L045056469
L045056469L045056469
L045056469
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
G017444651
G017444651G017444651
G017444651
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
O017429398
O017429398O017429398
O017429398
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

IRJET- Encryption based Approach to Find Fake Uploaders in Social Media

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1668 Encryption Based Approach to Find Fake Uploaders in Social Media Shereena T Abdul Rasheed 1, Sadakathulla P.K 2 1MCA student, Centre for Computer Science and Information Technology, University of Calicut, Kerala 2Assistant Professor, Centre for Computer Science and Information Technology, University of Calicut, Kerala -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - In the digital era, we can see rapid growth in digital contents through different Medias. As we know social media plays an important role for generating digital contents using modern electronic devices and sharingof dataandother digital contents. Digital images are the one of the frequently used media. In the context we have a challenge to find out the fake uploaders. In this paper we are proposing a new strategy to find out such fake uploaders by using encryption based method. The proposed system uses steganography based encryption to identify the fake uploaders in an easy way. Here we embed some personal information In to the digital image while uploading the content. By using this we can easily find the individual easily. Key Words: Encryption, Decryption, Steganography, social media security, LSB Substitution. 1. INTRODUCTION In the modern world, there exists a wide range imaging techniques for capturing, storing and modifying digital images. With the increase in consumer generated image content using handheld devices such as mobile cameras and ease of sharing, fake news via images are spreading rapidly on social media. There has been a very active research area in the last decade. Cryptography and steganography can be used to provide security for digital content. Cryptography uses mathematics to encrypt and decrypt data to provide security by transforming plaintext into ciphertext. Steganography is the art of hiding information in other information. With this paper, we mean that along with the photograph, we also have related meta-data as contact number of the person who upload that photograph firstly. Here, theperson behind the photograph can be identified easily by this application. Identifying person will eliminate the system of easily spreading the image and this will also act as bigtool to give evidence in front of justice court. Here we use an algorithm that hides the contact number of the person who uploads the image. The contact number that embeddedwith the image never loses even if it is shared among different people. Whenever a situation arises to find out the person who has uploaded the image, we can easily find out the contact number of the person by just applying the reverse algorithm. 2. LETERATURE REVIEW Besides cryptography, steganography can be used to secure information. Steganography is a technique of hiding data/information in digital media. Both Cryptography and steganography methods of digital images are widely used to protect and frustrate opponents' attacks from unauthorized access. Thus, image encryption techniques are required to protect the data [1]. There is a difference between cryptography and steganography. Cryptography scrambles messages so that they cannot be understood. On the other hand, steganography hides the actual messageinanother[2]. Over the last few years, there are many different steganographic methods areproposed.Mostofthemarevery simple techniques so that those can be broken easily by careful analysis of statistical propertiesofthechannel’snoise [3].Recently,somenewsteganographicalgorithmshavebeen proposed fortwo-color binaryimages[4].JohnsonandSushil explain what steganography is and provide a brief history of steganography, describe how steganography is applied to hide information in images, and survey a few steganography software applications [5]. TsungYuan and Wen-Hsiang proposed a new steganographic method that uses change tracking technique for hiding data in Microsoft Word documents [6]. Sinha and Singh proposed a method to encrypt an image for secure transmission [7].This method use the digital signature of the image. Digital signatures enable the recipient of a message to authenticate the sender and verify that the message isintact.Kisiketal[4]proposeda steganographic algorithm which embeds a secret message into bitmap images and palette-based images. Y.K JainandR.RAhriwalproposedLeastSignificanttechnique to hide a message in an image. This technique generates a steganographykeyafterembeddingthemessage.Thekeyhas different layers. Every layer hasa fixed number of bits.These bits are embedded in least significant of the image [8].The method proposed by Mohammad A Ahmed uses Least Significant technique to hide data in digital image. Then the digital image will be implemented in hash significant technique to get the result in hashing value[9].El-Emam proposed a method which hides message in an image inform if pixels. To retrieve the hidden message these pixels are called. Steganography is used to hide and retrieve the message [10]. Akhtar N, Johri P and Khan S implemented a variation of traditional Least Significant Bit (LSB) algorithm. It uses bit inversion method to enhance the quality of the image which the message is hidden. This method has lesser modification in pixels compared to traditional LSB method [11]. P. U. Deshmuk and T. M. Pattewar proposed the edge adaptive steganography based on LSB substitution method. They hide secret message in sharp regions of the image. This technique also improvesthe quality of stego image [12]. D. Baby, J. Thomas, G. Augustine, E. George and N.R. Michael presented “Novel DWT based image securing method using steganography”. They proposed a new steganography technique in which multiple RGB images are embedded into single RGB image using DWT steganography technique. This
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1669 method has level of PSNR (Peak signal - to - noise ratio) and structural similarity (SSIM) index values [13]. G. Prashanti and K. Sandhyarani have done survey on LSB based image steganography and also two new techniques are presented. First technique hides secret message in the cover image and second one embeds a grayscaleimageintoanothergrayscale image. These two techniques have great security because secret information is hidden on random selected location of LSBs of the image [14]. 3. LETERATURE REVIEW The proposed system aims tohidesthecontactnumberofthe person who uploads the image. The following figure shows the working of the proposed system. Fig -1: Working of proposed system Here we use the Least Significant Bit (LSB) substitution method to hide the data within the image. This method replaces the pixels of image by the secret data. The image is stored as m-by-n matrix having several pixels. Each pixel in the image is represented as RGB components and that determine color of each individual pixel. RGB images are stored as 24 bit format, where the RGB components are of 8 bits each. Here we use the contact number of the person who uploads the image and a string as a secret data. The string is used to check whether theimagealreadycontainanycontactnumber or not. This secret data is then converted into byte array. Here we use 3 bit of R, 3 bit of G and 3 bit of B to hide 1 byte of string. Here we replace first some pixels of the image and the length of the secret data determines the number of pixels to be replaced. This results only asmall changeinthevalueof RGB component, which human eyes can’t detect. Whenever any situationarises,thereversealgorithmhelpsto identify the contact number of thepersonwhofirstlyuploads the image. This secret data will not loss even if it shared by different people. 3.1 Algorithm to hide data Step 1: Load image into a variable ‘image’. Step 2: Check whether the image is already contains any contact number or not by reverse algorithm. Step 3: If the image does not contain any numberthenchecks the mode of image. Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set, length= len(msg) width, height= image . size index= 0 encoded= image.copy() Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then c= msg[index] imsg= int (ord(c)) r1= imsg & 7 imsg= imsg >> 3 g1=imsg & 7 imsg= imsg >> 3 b1=imsg & 7 r= r & 248 g= g & 248 b= b & 252 r= r | r1 g= g | g1 b= b| b1 Step 8: encode.putpixel((col,row),(r,g,b)) index= inex+1 Step 9: Stop 3.2 Algorithm to retrieve data Step 1: Load image into a variable ‘image’ Step 2: Check whether the image is already contains any contact number or not Step 3: If the image does not contain any numberthenchecks the mode of image Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set , width, height= image . size index= 0 Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then r1= r & 7 g1= (g & 7) << 3 b1= (b & 3) << 6 val = r1 | g1 | b1 msg = msg + (str ( chr ( val ) ) ) Step 8: index= inex+1 Step 9: Stop
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1670 4. CONCLUSION We have studied about the spreading of fake news through social media and this project aims to control these fraudulent activities. We have used LSB substitution algorithm to hide the secret data within the image. This method is very simple and we can easily extract contact number from the image by just applying the reverse algorithm. We have tested our solutionona samplenetwork. This method proves that it is possible to extract the contact number of the uploader even if it shared many times. REFERENCES [1] H. Zenon, V. Sviatoslav, R.Yuriy, "Cryptography and steganography of video information in modern communications," 1998, Citeseer.ist.psu.edu/hrytskiv98cryptography.html [2] M.M. Amin, M. Salleh, S. Ibrahim, M.R Katmin, M.Z.I. Shamsuddin, "Informationhidingusingsteganography," Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National [3] Elke, Fraz, "Steganography preserving statistical properties," proceeding of the 5th internationally Workshop oninformationHiding,Noordwijkerhout,The Netherlands, October 2002, LNCS 2578, Springer 2003, pp. 278-294. [4] EE. Kisik Chang, J. Changho, L. Sangjin, "High Quality Perceptual Steganographic Techniques," Springer, Vol. 2939, 2004, pp.518-531. [5] N.F. Johnson, J. Suhil, " Exploring Steganography:Seeing the Unseen," Computing practices, 2006, 2006, http://www.jjtc.com/pub/r2026.pdf [6] L. Tsung-Yuan, T. Wen-Hsiang ,"A New Steganographic Method for Data Hiding in Microsoft Word Documents by a ChangeTracking Technique," InformationForensics and Security, IEEE Transactions on Vol.2,Issue1,March 2007 Page(s):24 – 30, Digital Object Identifier 10.1109/TIFS.2006.890310. [7] A. Sinha, K. Singh, "A technique for image encryption using digital signature," Source:OpticsCommunications, vol.218, no. 4, 2003, pp.229-234. [8] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego- Keys”, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1. [9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O. Alhussainan, “Achieving Security for Images by LSB and MD5”, Journal of Advanced Computer Science and Technology Research, Vol. 2, Issue No.3, Pages No. 127- 139, Sept., 2012. [10] N.N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232. [11] Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security and Quality of LSB Based Image Steganography," Computational Intelligence and Communication Networks (CICN), 2013 5th International Conferenceon , vol., no., pp.385,390, 27-29 Sept. 2013. [12] P.U. Deshmukh and T.M. Pattewar, “A Novel Approach for Edge Adaptive Steganography on LSB Insertion Technique” IEEE International Conference on Information Communication and Embedded Systems (ICICES), Feb. 2014, pp. 1-5. [13] D. Baby, J. Thomas, G. Augustine, E. George, N.R.Michael, “ A Novel DWT based Image Securing method using Steganography”, International Conference on Information and Communication Technologies (ICICT), Procedia Computer Science, April 2015, pp. 612-618. [14] G. Prashanti, K. Sandhyarani, “A New Approach for Data Hiding with LSB Steganography”, Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI, Springer 2015, pp. 423-430.