Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
We are now in mid of 2012. As predicted by many techno geeks, this year is phenomenal for IT related technologies including security, networking and web technologies. In April cloud war is started between two big rivals Microsoft & Google. Both making sure that its going to be secure and useful for smart phone users as well. With introduction of new such technologies we must ensure security over the web. Here HTTPS comes into picture and we brought this topic in CHMag's Mom's guide. Along with it topics like Steganography(Tech Gyan), a new toolkit - Kautilya(Tool Gyan), preventing SQL injections(Code Gyan) are covered.
If you have good write up and topic that you think people should know about it then please share with CHMag. Also if you have suggestions, feedback & articles, send it on info@chmag.in. Keep reading!!
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
With computers having GHz of processing speed, information / data either stored or in
transmission has become more and more vernalable to hostile eavesdropping, theft,
wiretapping etc. This urges us to devise new data hiding techniques to protect and secure data
of vital significance. Steganography is a method of securing data by obscuring the contents in
another media (called Cover) in which it is saved / transmitted. This doctorial thesis proposal will
present a new Steganographic Technique for hiding data in (ASCII) text files together with its
Software implementation, a research area in Steganography which is considered as
toughest among all, to address.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With the emergence of supermarkets, kirana stores have been depleting day by day. Government is in the grave situation to decide whether to allow 50% FDI or not in the retail sector. There are certain retail outlets such as Walmart, Metro which are better in quality, cheaper in rates, and offering a range and variety of products under one roof. These malls have entered in India but they are into cash and carry business only and not in the multi brand retail sector. Many of them have entered through joint ventures. If government allow them to enter in India, it can be said that all the small shops and kirana stores will not be able to stand in the market. They cannot compete with them. Now the question arise how the kirana stores can be saved from these big giants in the market. It is the need of the hour today to save these kirana stores because in a developing country like India where the income of an average man is low, such types of small business can make them able to earn their living. The present research is an attempt to find out the weaknesses of kirana stores as compared to the malls and to find out the solutions for the betterment of the stores. The research is conducted on various kirana stores in Punjab. The study identifies the problems being faced by kirana merchants such as recovery of credit, inventory management, goodwill in terms of quality, low space, and lack of variety etc. But during the research it has been found out that there are certain areas where these kirana stores have an edge over the market such as emotional attachment with the customer, to fulfil the timely need of credit of the customer, easy availability etc. It is concluded that both kirana stores and malls are important to the Indian economy. FDI is important for the growth of the economy but it should come for the rescue of the existing business and not as a threat. Secondly government intervention is seeked to make improvements in the functioning of the kirana stores. If kirana stores starts using their strategic advantages to the optimum level, they can make can make their existence strong in the market.
The Effect Of Planning And Control To Bureaucracy Behavior In The Improving S...IOSR Journals
The main problem in this study is the service quality in the Department of Population and Civil Registration Jakarta is considered optimal. Bureaucratic behavior, presumably as a result of poor planning and oversight that cannot be implemented properly. The purpose of this research is to gain any influence planning on the bureaucratic behavior, monitoring on bureaucratic behavior, and the influence of bureaucratic behavior on the service quality and to obtain a new concept for the development of science and useful and can be applied in the community, especially in the Department of Population and Civil Jakarta. The method used in this study is non-experimental survey method with sampling Stratified Random Sampling. Technical analysis is the data used path analysis. Test the validity of the instrument using the Pearson correlation test product moment and reliability of the instrument using Cronbach alpha The results showed that the positive effect the planning on the bureaucracy behavior, oversight positive effect controlling on the behavior of bureaucracy and positive effect bureaucratic behavior on service quality. The findings in this study are not routinely conducted surveillance dimension thus potentially deviant bureaucracy behavior is not optimal to improve the service quality. The implications of this research are bureaucratic behavior is important in improving Service quality.
WSO-LINK: Algorithm to Eliminate Web Structure Outliers in Web PagesIOSR Journals
Abstract: Web Mining is specialized field of Data Mining which deals with the methods and techniques of data
mining to extract useful patterns from the web data that is available in web server logs/databases. Web content
mining is one of the classifications of web mining which extracts information from the web documents
containing texts, links, videos and multimedia data available in World Wide Web databases. Further, web
structure mining is a kind of web content mining which extracts patterns and meaningful information from the
structure of hyperlinks contained in web documents having the same domain. The hyperlinks which are not
related to content or the invalid ones are called web structure outliers. In this paper the basic aim is to find out
these web structure outliers.
Keywords- Outliers, web outlier mining, web structure mining, Web mining, web structure documents
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...IOSR Journals
Abstract: A good number of scientist, engineers, laboratory or workshop users have lost their lives and the
lives of others due to accidents in the workshop caused by ignorance, neglect or carelessness. This paper focus
on the incident and prevalence rate of workshop and laboratory accidents in twenty (20) schools within Cross
River State, Nigeria. The investigation took place between January 2008 and December 2012 (a period of five
years). A total of 66 departments were investigated. The data was source with the help of the technologist and
head of Department of each of the schools. Based on these data, using descriptive analysis, multiple bar chart
and Trend analysis (Analysis of variance-SPSS) to show the growth and decline of laboratory or workshop
accidents across various departments over the years of study. The result revealed that the average number of
accidents occurred most in chemistry department; UNICAL and CRUTECH at 25 and 18 respectively, (table 1
and 2). And that of 18 secondary schools indicated that Bekwara Local Government Area was the highest
numbers of accidents (20.0) table 3, while Biase Local Government Area had the least (10.2), physics and
biology had recorded less accidents (table 3). In the two universities, computer/Maths statistic Department had
less laboratory accident due to not being exposed to heavy chemical. Hence, from this result, 40 workshop
safety and precautionary steps are release to avoid or minimize accidents in the laboratory or workshop towards
a healthy carrier.
Key Word: workshop accidents, Technology, Scientist, Engineers, Safety and precautions
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
We are now in mid of 2012. As predicted by many techno geeks, this year is phenomenal for IT related technologies including security, networking and web technologies. In April cloud war is started between two big rivals Microsoft & Google. Both making sure that its going to be secure and useful for smart phone users as well. With introduction of new such technologies we must ensure security over the web. Here HTTPS comes into picture and we brought this topic in CHMag's Mom's guide. Along with it topics like Steganography(Tech Gyan), a new toolkit - Kautilya(Tool Gyan), preventing SQL injections(Code Gyan) are covered.
If you have good write up and topic that you think people should know about it then please share with CHMag. Also if you have suggestions, feedback & articles, send it on info@chmag.in. Keep reading!!
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
With computers having GHz of processing speed, information / data either stored or in
transmission has become more and more vernalable to hostile eavesdropping, theft,
wiretapping etc. This urges us to devise new data hiding techniques to protect and secure data
of vital significance. Steganography is a method of securing data by obscuring the contents in
another media (called Cover) in which it is saved / transmitted. This doctorial thesis proposal will
present a new Steganographic Technique for hiding data in (ASCII) text files together with its
Software implementation, a research area in Steganography which is considered as
toughest among all, to address.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With the emergence of supermarkets, kirana stores have been depleting day by day. Government is in the grave situation to decide whether to allow 50% FDI or not in the retail sector. There are certain retail outlets such as Walmart, Metro which are better in quality, cheaper in rates, and offering a range and variety of products under one roof. These malls have entered in India but they are into cash and carry business only and not in the multi brand retail sector. Many of them have entered through joint ventures. If government allow them to enter in India, it can be said that all the small shops and kirana stores will not be able to stand in the market. They cannot compete with them. Now the question arise how the kirana stores can be saved from these big giants in the market. It is the need of the hour today to save these kirana stores because in a developing country like India where the income of an average man is low, such types of small business can make them able to earn their living. The present research is an attempt to find out the weaknesses of kirana stores as compared to the malls and to find out the solutions for the betterment of the stores. The research is conducted on various kirana stores in Punjab. The study identifies the problems being faced by kirana merchants such as recovery of credit, inventory management, goodwill in terms of quality, low space, and lack of variety etc. But during the research it has been found out that there are certain areas where these kirana stores have an edge over the market such as emotional attachment with the customer, to fulfil the timely need of credit of the customer, easy availability etc. It is concluded that both kirana stores and malls are important to the Indian economy. FDI is important for the growth of the economy but it should come for the rescue of the existing business and not as a threat. Secondly government intervention is seeked to make improvements in the functioning of the kirana stores. If kirana stores starts using their strategic advantages to the optimum level, they can make can make their existence strong in the market.
The Effect Of Planning And Control To Bureaucracy Behavior In The Improving S...IOSR Journals
The main problem in this study is the service quality in the Department of Population and Civil Registration Jakarta is considered optimal. Bureaucratic behavior, presumably as a result of poor planning and oversight that cannot be implemented properly. The purpose of this research is to gain any influence planning on the bureaucratic behavior, monitoring on bureaucratic behavior, and the influence of bureaucratic behavior on the service quality and to obtain a new concept for the development of science and useful and can be applied in the community, especially in the Department of Population and Civil Jakarta. The method used in this study is non-experimental survey method with sampling Stratified Random Sampling. Technical analysis is the data used path analysis. Test the validity of the instrument using the Pearson correlation test product moment and reliability of the instrument using Cronbach alpha The results showed that the positive effect the planning on the bureaucracy behavior, oversight positive effect controlling on the behavior of bureaucracy and positive effect bureaucratic behavior on service quality. The findings in this study are not routinely conducted surveillance dimension thus potentially deviant bureaucracy behavior is not optimal to improve the service quality. The implications of this research are bureaucratic behavior is important in improving Service quality.
WSO-LINK: Algorithm to Eliminate Web Structure Outliers in Web PagesIOSR Journals
Abstract: Web Mining is specialized field of Data Mining which deals with the methods and techniques of data
mining to extract useful patterns from the web data that is available in web server logs/databases. Web content
mining is one of the classifications of web mining which extracts information from the web documents
containing texts, links, videos and multimedia data available in World Wide Web databases. Further, web
structure mining is a kind of web content mining which extracts patterns and meaningful information from the
structure of hyperlinks contained in web documents having the same domain. The hyperlinks which are not
related to content or the invalid ones are called web structure outliers. In this paper the basic aim is to find out
these web structure outliers.
Keywords- Outliers, web outlier mining, web structure mining, Web mining, web structure documents
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...IOSR Journals
Abstract: A good number of scientist, engineers, laboratory or workshop users have lost their lives and the
lives of others due to accidents in the workshop caused by ignorance, neglect or carelessness. This paper focus
on the incident and prevalence rate of workshop and laboratory accidents in twenty (20) schools within Cross
River State, Nigeria. The investigation took place between January 2008 and December 2012 (a period of five
years). A total of 66 departments were investigated. The data was source with the help of the technologist and
head of Department of each of the schools. Based on these data, using descriptive analysis, multiple bar chart
and Trend analysis (Analysis of variance-SPSS) to show the growth and decline of laboratory or workshop
accidents across various departments over the years of study. The result revealed that the average number of
accidents occurred most in chemistry department; UNICAL and CRUTECH at 25 and 18 respectively, (table 1
and 2). And that of 18 secondary schools indicated that Bekwara Local Government Area was the highest
numbers of accidents (20.0) table 3, while Biase Local Government Area had the least (10.2), physics and
biology had recorded less accidents (table 3). In the two universities, computer/Maths statistic Department had
less laboratory accident due to not being exposed to heavy chemical. Hence, from this result, 40 workshop
safety and precautionary steps are release to avoid or minimize accidents in the laboratory or workshop towards
a healthy carrier.
Key Word: workshop accidents, Technology, Scientist, Engineers, Safety and precautions
“Rover - Remote Operated Vehicle for Extraction and Reconnaissance”IOSR Journals
Inspired from differential drive mechanism of army tank and chain drive of tank for movement of rover. Try to deploy the concept of crane working in rover for extraction purpose. Use the camera for the security purpose and surveillance in rover for the reconnaissance purpose.
Use “pro-engineering software” for designing purpose of rover. It is prototype to explain the concept of differential drive mechanism and its use in robotics.
Modification of Disc Brakes Using Rotating Brake PadsIOSR Journals
Under the topic ‘Modification of Disc Brakes using Rotating Friction Pads’, I have studied different
components of disc brake which includes rotor, calipers, and fixed friction pads.My main aim is to increase the
braking effect by modifying the existing design by using rotating friction pad. This friction pad is made to rotate
in opposite direction as that of rotor, this is done by using a separate assembly of compound gear train. In this
assembly 2 shafts are used, one shaft is connected between tire and gear and second shaft connects gear and
rotating friction pad. Both the gears are meshed with each other. As the wheel rotates in clockwise direction,
the gear attached to it will also rotate. Other gear which is in meshed position with first gear will rotate in anticlockwise
direction. This will help to move friction pad in anti-clockwise direction as that of wheel’s clockwise
motion. Aim for using rotating friction pad is to provide maximum possible friction which results in retardation
of motion, rotating friction pad not only will provide the friction due to contact but will also provide the friction
due to rotation. Calculations regarding speed of gears, and motion of wheel will clearly elaborate the idea, this
slight modification helps in reducing braking time. Important thing in this innovation is that the energy required
to stop the wheel or disc of brakes is transmitted from wheel only
Analytical Optimization of Chassis Frame for 40ft Dual-Axle Flatbed Trailer D...IOSR Journals
This article will review a design and analysis study that reduces trailer chassis mass while
minimizing the total cost impact. Design approaches, material selections and proposed section were reviewed.
The Trailer chassis main member were quantified and summarized to create an overall mass and weighted cost
estimate for a low mass Trailer.
Performance Analysis of Rake Receivers in IR–UWB SystemIOSR Journals
ABSTRACT : Suppression of interference in time domain equalizers is attempted for high data rate impulse radio (IR) ultra wideband communication system. The narrow band systems may cause interference with UWB devices as it is having very low transmission power and the large bandwidth. SRAKE receiver improves system performance by equalizing signals from different paths. This enables the use of SRAKE receiver techniques in IR UWB systems A semi analytical approach is used to investigate the BER performance of SRAKE receiver on IEEE 802.15.3a UWB channel models. Study on non-line of sight indoor channel models (both CM3 and CM4) illustrates that bit error rate performance of SRake receiver with NBI performs better than that of Rake receiver without NBI Keywords – Bit error rate, Impulse radio, Non-line of sight, SRAKE receiver, Ultra wideband (UWB)
Descriptive New features of high angular momentum rotational states in some r...IOSR Journals
The results from the variable moment of inertia (VMI) and cubic polynomial (CP) models with the available experimental information on transition energies for the yrast band levels in all studied nuclei. These models has been generalized so as to be applicable to transitional and vibrational nuclei by requiring that the extended models reduce at low angular momentum, to the polynomial dependence which gives excellent fits to the experimental spectra in the spherical, transitional and deformed regions. The level structure indicate a transition from collective to few-particle characteristics at high spin, possibly suggesting a change shape from prolate through triaxial to oblate. The loss of collectivity occurs at much lower angular momentum than predicted by calculations. The calculated Qt-value of the yrast band of the nucleus with N = 90.
Climatological Effects of Total Solar Radiation in Awka, NigeriaIOSR Journals
Harmattan, humidity and temperature are amongst some climatological variables that affect solar radiations. In this paper we evaluated the effects of these climatological variables on solar radiation in Awka, Anambra State, Nigeria. The city Awka has the latitude of 6.06oN and longitude of 7.0oE. We took various readings of temperature and humidity from December, 2012 to July 2013 and we observed as expected that solar radiation increased with increase in temperature, while increase in humidity greatly reduces solar energy. The harmattan effect on solar radiation showed less fluctuations in the value of solar radiation during any particular day. The basic problem during this period is dust, which uniformly reduces the solar radiation during any particular day. Observations during the period of measurement showed that the fluctuations during harmattan and high temperature were essentially due to dust which was responsible for the high diffuse nature and attenuation on the solar radiation. The regression co-efficient for the periods under study in the city were determined for use in predicting solar radiation.
The contribution of Sport and Physical activity towards the achievement of co...IOSR Journals
Abstract: In the last two decades Zimbabwe suffered severe socioeconomic and political crisis. The crisis was
characterised by unprecedented rates of inflation which were exacerbated by political instability and economic
sanctions. The economic challenges led to severe brain drain of Zimbabwe health professionals. The elements of
a previously well maintained health care system severely deteriorated. Community health was therefore
seriously compromised. Now that Zimbabwe seem to be on the recovery path this article critiques, reviews and
justifies the potential contribution which sport and physical activity can make towards the achievement of
community healthy objectives in Zimbabwe in line with millennium development goal number six. The content
analysis and review identified that sport and physical activity can play a significant role in improving the health
of members of the Zimbabwean community. It is apparent from the review that Sport and physical activity can
help reduce the incidence of obesity, cardiovascular diseases, HIV/AIDS, diabetes, hypertension and many other
health problems bedevilling the Zimbabwean society today and hence contribute towards the achievement of
Millennium Development Goal number six.
Keywords: Community health, Physical activity, Sport, MDGs, Zimbabwe
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...IOSR Journals
Abstract : This paperdevelops an understanding of creating and improving the design of microstripantenna by the performance analysis of resultsfromitsvarious configurationsrelating to rectangular patch microstripantenna. Furthermore, itaccommodates a simulated patch antennawith effective results for bluetooth applicationsatafrequency of 2.4GHz. The proposed antenna is not only designed on the formulated calculations but also analyzed on different sizes, positions and orientations of substrate, feeding point and slots respectively. Propagation parameters are greatly improved by amendments suggested by the analysis of the variation based studies provided by this paper. The initial resultsobtained using formulae based designs are compared with the ameliorated results to illustrate the effects of such variations on antenna parameters. The final antenna show significantly improved return losses of -46.7dB, VSWR of 1.0093, Bandwidth of 180MHz and a far field radiation pattern with a gain of 2.2782dB. The Antenna designed is optimized and interpreted with Ansoft HFSS 13.0 simulator. Keywords: Bluetooth, rectangular patch antenna, feedpoint, trial and error method, slot orientation, wide bandwidth
A survey on context aware system & intelligent Middleware’sIOSR Journals
Abstract: Context aware system or Sentient system is the most profound concept in the ubiquitous computing.
In the cloud system or in distributed computing building a context aware system is difficult task and
programmer should use more generic programming framework. On the basis of layered conceptual design, we
introduce Context aware systems with Context aware middleware’s. On the basis of presented system we will
analyze different approaches of context aware computing. There are many components in the distributed system
and these components should interact with each other because it is the need of many applications. Plenty
Context middleware’s have been made but they are giving partial solutions. In this paper we are giving analysis
of different middleware’s and comprehensive application of it in context caching.
Keywords: Context aware system, Context aware Middleware’s, Context Cache
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...IOSR Journals
Abstract : Node localization is important parameter in WSN. Node localization is required to report origin of
events which makes it one of the important challenges in WSN. Received signal strength (RSS) is used to
calculate distance between mobile node and reference node. The position of the mobile node is calculated using
multilateration algorithm (MA). Extended Kalman filter (EKF) is utilized to estimate the actual position. In this
paper, the implementation and enhancement of a tracking system based on RSS indicator with the aid of an
Extended Kalman Filter (EKF) is described and an adaptive filter is derived.
Keywords - Extended Kalman filter (EKF), mobile node tracking, multilateration algorithm (MA), received
signal strength (RSS), Wireless sensor networks (WSN)
Design, Analysis and Implementation of Modified Luby Transform CodeIOSR Journals
Abstract : Bit losses in erasure channels like computer networks are of great concern. The existing methods to combat bit losses are either inefficient or time consuming due to the retransmission protocols involved. Through this paper, we propose a Modified Luby Transform (MLT) coding scheme to efficiently transmit data over live computer networks. The MLT code can combat bit losses as well as eliminate the need for retransmission. The usability and reliability of the proposed MLT code is verified by testing it on a live computer network. Keywords : Erasure channel, Fountain Codes, Luby Transform Codes , Wired Networks, Wireless Networks
The comprehensive development of information and communication technology in the recent decades has made human face wonderfulevolution in all aspects of his life. Indeed, this evolution has had undeniable effects on economy general structure and social and cultural parts at the international level. Also, this evolution includes financial and banking services of the current century economy. They are so efficient that they have created some innovations on the kind, quality and quantity of the presented services. Technological revolutions creating high speed and low cost systems of electronic exchanges have seriously evolved financial and banking market structure. Thus this research considers e-banking fulfillmen.
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
Abstract: A wireless sensor network consists of a large number of sensor nodes which are deployed over an
area to perform local computations based on information gathered from the surroundings. Each node in the
network consists of a battery, but it is very difficult to change or recharge batteries. So the question is how to
enhance the lifetime of the network to such a long time. Therefore, in order to maximize the lifetime of the
network, the consumption of energy must be minimized. This is an important challenge in sensor networks as
sensors can not be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. In
this paper, the main techniques used for energy conservation in sensor networks are discussed which include
duty cycling scheme, data driven approaches, mobility-based schemes, energy efficient MAC protocols and node
self scheduling scheme. These schemes can be used to improve the energy efficiency of the wireless sensor
network so that the network can work with greater efficiency and high battery lifetime.
Keywords : Energy conservation, energy consumption, sensor nodes, wireless sensor networks
A Study to Evaluate Spatial Gait Parameters in Patients of Osteoarthritic KneeIOSR Journals
Abstract: Osteoarthritis is a slowly evolving articular disease, which appears to originate in the cartilage and
affects the underlying bone, soft tissues and synovial fluid. Quantitative gait analysis is an important clinical
tool for quantifying normal and pathological patterns of locomotion, and has also been shown to be useful for
prescription of treatment as well as in the evaluation of the results of such treatment. The objectives of this study
was to evaluate spatial gait parameters variations in patients with osteoarthritic knee as compared to normal
healthy individuals. 100 subjects were included in the study, 50 normal healthy subjects and 50 subjects with
bilateral knee osteoarthritis with age group of 40-60 years based on the inclusion and exclusion criteria. Before
gait analysis, all subjects were given informed consent as advised by the Institutional Ethical Committee. Gait
analysis was done for both groups with same protocol. Following gait parameters was measured individually
for each subject: Step length [m], Stride length [m], Normalised stride length [%], Step width [m] and Foot
angle [degree]. Paired and unpaired t- test will be used for the analysis of data. The study concluded that there
was significant difference is spatial gait parameters in patients with osteoarthritic knee as compared to normal
healthy individuals.
Keywords: Osteoarthritis, Gait parameters, Spatial gait parameters
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
Similar to Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide Information File with an Image) (20)
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide Information File with an Image)
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 3 (Nov. - Dec. 2013), PP 17-25
www.iosrjournals.org
www.iosrjournals.org 17 | Page
Steganography
Technique of Sending Random Passwords on Receiver’s Mobile
(A New Technique to Hide Information File with an Image)
Shubhendu S. Shukla1
, Vijay Jaiswal2
, Sumeet Gupta3
, Anurag Singh4
1
(Asst. Professor/ Department of Management/ SR Group of Institutions, Lucknow)
2
(Asst. Professor/ Department of Information Technology/ SR Group of Institutions, Lucknow)
3
(Asst. Professor/ Department of Computer Science/ SR Group of Institutions, Lucknow)
4
(Asst. Professor/ Department of Computer Science / SR Group of Institutions, Lucknow)
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
I. Introduction
One of the reasons that intruders can be successful is the most of the information they acquire from a
system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it
to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is,
through the use of Steganography. Steganography is a technique of hiding information in digital media. In
contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others
from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution. Steganography
is the art of concealing information in ways that prevents the detection of hidden messages. Steganography
include an array of secret communication methods that hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security of information
has become a fundamental issue. Besides cryptography, Steganography can be employed to secure information.
In cryptography, the message or encrypted message is embedded in a digital host before passing it through the
network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of
information hiding can be extended to copyright protection for digital media: audio, video and images.
The growing possibilities of modern communications need the special means of security especially on computer
network. The network security is becoming more important as the number of data being exchanged on the
internet increases. Therefore, the confidentiality and data integrity are requires to protect against unauthorized
access and use. This has resulted in an explosive growth of the field of information hiding Information hiding is
an emerging research area, which encompasses applications such as copyright protection for digital media,
watermarking, fingerprinting, and Steganography.
Steganography hide the secrete message within the host data set and presence imperceptible and is to
be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed
to be invisible to an information analysis.
II. What is Steganography?
Steganography is the practice of hiding private or sensitive information within something that appears to be
nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the
way that they both are used to protect important information. The difference between two is that
Steganography involves hiding information so it appears that no information is hidden at all. If a person or
persons views the object that the information is hidden inside of he or she will have no idea that there is any
hidden information, therefore the person will not attempt to decrypt the information.
What Steganography essentially does is exploit human perception, human senses are not trained to look for
files that have information inside of them, although this software is available that can do what is called
Steganography. The most common use of Steganography is to hide a file inside another file.
2. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 18 | Page
III. History of Steganography:
Through out history Steganography has been used to secretly communicate information between people.
Some examples of use of Steganography is past times are:
During World War 2 invisible ink was used to write information on pieces of paper so that the paper appeared to
the average person as just being blank pieces of paper. Liquids such as milk, vinegar and fruit juices were used,
because when each one of these substances are heated they darken and become visible to the human eye.
In Ancient Greece they used to select messengers and shave their head, they would then write a message on
their head. Once the message had been written the hair was allowed to grow back. After the hair grew back the
messenger was sent to deliver the message, the recipient would shave off the messengers hair to see the secrete
message.
IV. Project Scope:
This paper is developed for hiding information in any image file. The scope of the paper is
implementation of Steganography tools for hiding information includes any type of information file and image
files and the path where the user wants to save Image and extruded file.
V. Methodology:
User needs to run the application. The user has two tab options – encrypt and decrypt. If user select
encrypt, application give the screen to select image file, information file and option to save the image file. If
user select decrypt, application gives the screen to select only image file and ask path where user want to save
the secrete file.
This project has two methods – Encrypt and Decrypt.
In encryption the secrete information is hiding in with any type of image file.
Decryption is getting the secrete information from image file.
VI. Steganography vs Cryptography:
Basically, the purpose of cryptography and Steganography is to provide secret communication.
However, Steganography is not the same as cryptography. Cryptography hides the contents of a secrete message
from a malicious people, whereas Steganography even conceal the existence of the message. In cryptography,
the system is broken when the attacker can read the secret message. Breaking a Steganography system need the
attacker to detect that Steganography has been used.
It is possible to combine the techniques by encrypting message using cryptography and then hiding the
encrypted message using Steganography. The resulting stego-image can be transmitted without revealing that
secret information is being exchanged.
VII. Steganography vs Watermarking:
Steganography pay attention to the degree of Invisibility while watermarking pay most of its attribute
to the robustness of the message and its ability to withstand attacks of removal, such as image
operations(rotation, cropping, filtering), audio operations(rerecording, filtering)in the case of images and audio
files being watermarked respectively.
It is a non-questionable fact that delectability of a vessel with an introduced data (Steganography
message or a watermark) is a function of the changeability function of the algorithm over the vessel.
That is the way the algorithm changes the vessel and the severity of such an operation determines with no doubt
the delectability of the message, since delectability is a function of file characteristics deviation from the norm,
embedding operation attitude and change severity of such change decides vessel file delectability.
A typical triangle of conflict is message Invisibility, Robustness, and Security. Invisibility is a measure
of the in notability of the contents of the message within the vessel.
Security is sinominous to the cryptographic idea to message security, meaning inability of reconstruction of the
message without the proper secret key material shared.
3. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 19 | Page
Robustness refers to the endurance capability of the message to survive distortion or removal attacks
intact. It is often used in the watermarking field since watermarking seeks the persistence of the watermark over
attacks, steganographic messages on the other hand tend to be of high sensitivity to such attacks. The more
invisible the message is the less secure it is (cryptography needs space) and the less robust it is (no error
checking/recovery introduced).The more robust the message is embedded the more size it requires and the more
visible it is.
VIII. Applications of Steganography
Steganography is applicable to, but not limited to, the following areas.
Confidential communication and secret data storing
Protection of data alteration
Access control system for digital content distribution
Media Database systems
The area differs in what feature of the Steganography is utilized in each system.
8.1. Legitimate Use
Steganographic techniques have obvious uses, some legitimate, some less so, and some are likely
illegal. The business case for protection of property, real and intellectual is strong. The watermarking of digital
media is constantly improving, primarily in an attempt to provide hardened watermarks or proof of ownership.
Individuals or organizations may decide to place personal/private/sensitive information in Steganographic
carriers. Admittedly, there are usually better ways to manage this task. One can liken these applications to the
use of a deadbolt lock on a door. The deadbolt will keep honest people honest, but those determined to break
and enter can simply break a window and gain entry. With advances in Steganography, it is possible that this
medium could serve as a relatively secure storage/transmission method.
8.2. Illegal Use
Other uses for Steganography range from the trivial to the abhorrent. There are claims that child
pornography may be lurking inside innocent image or sound files. While this is entirely possible, a search on the
internet for confirmation of this claim was unsuccessful.
An annual report on High Technology crime lists nine common types of computer crime:
Criminal communications
Fraud
Hacking
Electronic payments
Gambling and pornography
Harassment
Intellectual property offenses
Viruses
Pedophilia
In examining this list, one can identify several of these areas where Steganography could be used, especially
considering the broad term “criminal communications.” If one includes Steganographic techniques other than
computer related, the potential grows even more.
In terms of computer security, there are some areas to be aware of. One area that has potential far
ranging implications is “A protocol that uses Steganography to circumvent network level censorship.” The
author, Bennet Haselton, the coordinator of Peacefire.org (an organization that “opposes censorship that targets
Internet users under 18…”) describes a protocol that is “undetectable to censors.”
Finally, computer warfare should be addressed. In his Masters Thesis, Jordan T. Cochran, Captain, USAF
investigates Steganographic virus attacks. He finds that “The results indicate that Steganography tools are not
conducive to be sole attack weapons. However, the tools combined with other applications could be used to
automatically extract the hidden information with minimal user intervention.”
In another Masters Thesis, Dale A. Lathrop, Captain, USAF also investigates the possibility of virus
attacks using Steganographic techniques. He finds that “The results of this research indicate that the use of a
separate engine followed by an HTML-based electronic mail message containing a photographic image with a
Steganographically embedded virus or other payload is a vulnerable attack if implemented without the proper
environment variables in place.” He further finds that “it still requires human intervention to initiate the virus
attack.”
4. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 20 | Page
For those who find themselves as first responders in electronic crimes, the “Electronic Crime Scene
Investigation, A Guide for First Responders” written in July 2001 is freely available on the internet. This
publication offers basic, sound advice in the preservation and investigation of electronic crime scenes, and does
give mention to Steganography.
IX. Future Enhancements, Future Considerations:
To make it pure Steganography application with multiple password.
Due to time and computing limitations, we cannot explore all facets of Steganography and detection
techniques. As we studied the power in our pictures to test for hidden data. Another method which we were
unable to explore was to analyze the noise of the pictures. Adding hidden data adds random noise, so it
follows that a properly tuned noise detection algorithm could recognize whether or not a picture had
Steganography data or not.
9.1. Future Steganography
According to Richard E. Smith (a data security expert), he doesn‟t “see many practical uses for
Steganography because it only works as long as nobody expects you to use it.” The author respectfully takes
exception to this statement. Initially after reading this statement, the myth that Charles H. Duell, Commissioner
of Patents in 1899 had declared that the Patent Office should be closed because everything that could possibly
be invented had already been invented came to mind. Perhaps the computer security community should give up
on endless patches, security applications, etc because they only work if nobody expects that they are in use. To
quote Dale Carnegie, “Most of the important things in the world have been accomplished by people who have
kept on trying when there seemed to be no hope at all.”
There are ongoing studies to harden Steganographic images from steganalysis. In his paper,
“Defending Against Statistical Steganalysis,” Provos presents new methods which would allow one to select a
file in which a message might be safely hidden and resistant to standard statistical analysis.
X. Objective
The goal of this Steganography system is to convert communication. So, a fundamental requirement of
this Steganography system is that the hider message carried by Stego-media should not be sensible to human
beings. The other goad of Steganography is to avoid drawing suspicion to the existence of a hidden message.
This approach of information hiding technique has recently became important in a number of application area
This project has following objectives:
To product security tool based on Steganography techniques.
To explore techniques of hiding data using encryption module with more secure random password only
known by receiver.
To extract techniques of getting secret data using decryption module by authenticate user.
Steganography sometimes is used when encryption is not permitted. Or, more commonly,
Steganography is used to supplement encryption. An encrypted file may still hide information using
Steganography, so even if the encrypted file is deciphered, the hidden message is not seen
XI. Overview
The word Steganography comes from the Greek “Steganos”, which mean covered or secret and –
“graphy” mean writing or drawing. Therefore, Steganography means, literally, covered writing. It is the art
and science of hiding information such its presence cannot be detected and a communication is happening. A
secrete information is encoding in a manner such that the very existence of the information is concealed. Paired
with existing communication methods, Steganography can be used to carry out hidden exchanges. The main
goal of this paper it to communicate securely in a completely undetectable manner and to avoid drawing
suspicion to the transmission of a hider data. There has been a rapid growth of interest in Steganography for two
reasons:
The publishing and broadcasting industries have become interested in techniques for hiding encrypted copyright
marks and serial numbers in digital films, audio recordings, books and multimedia products
Moves by various governments to restrict the availability of encryption services have motivated people to study
methods by which private messages can be embedded in seemingly innocuous cover messages.
The basic model of Steganography consists of Carrier, Message and password. Carrier is also known as cover-
object, which the message is embedded and serves to hide the presence of the message.
Basically, the model for Steganography is shown on following figure:
5. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 21 | Page
Figure 1 CONCEPT OF STEGANOGRAPHY
Message is the data that the sender wishes to remain it confidential. It can be plain text, cipher text, other image,
or anything that can be embedded in a bit stream such as a copyright mark, a covert communication, or a serial
number. Password is known as Stego-key, which ensures that only recipient who knows the corresponding
decoding key will be able to extract the message from a cover-object. The cover-object with the secretly
embedded message is then called the Stego-object.
Recovering message from a Stego-object requires the cover-object itself and a corresponding decoding key if a
Stego-key was used during the encoding process. The original image may or may not be required in most
applications to extract the message. There are several suitable carriers below to be the cover-object:
Network protocols such as TCP, IP and UDP
Audio that using digital audio formats such as wav, midi, avi, mpeg, mpi and voc
File and Disk that can hides and append files by using the slack space
Text such as null characters, just alike morse code including html and java
Images file such as bmp, gif and jpg, where they can be both color and gray-scale.
In general, the information hiding process extracts redundant bits from cover-object. The process
consists of two steps:
Identification of redundant bits in a cover-object. Redundant bits are those bits that can be modified
without corrupting the quality or destroying the integrity of the cover-object.
Embedding process then selects the subset of the redundant bits to be replaced with data from a secret
message. The Stego-object is created by replacing the selected redundant bits with message bits
XII. Requirements:
12.1. Software Requirements:
.NET Framework 3.5
12.2. Hardware Requirements:
Processor: Preferably 1.0 GHz or Greater.
RAM : 1.0 GB or Greater.
XIII. Steganography Techniques:
Over the past few years, numerous Steganography techniques that embed hidden messages in
multimedia objects have been proposed. There have been many techniques for hiding information or messages
in images in such a manner that alteration made to the image is perceptually indiscernible. Commonly
approaches are includes LSB, Masking and filtering and Transform techniques. Least significant bit (LSB)
insertion is a simple approach to embedding information in image file. The simplest Steganography techniques
embed the bits of the message directly into least significant bit plane of the cover-image in a deterministic
sequence. Modulating the least significant bit does not result in human perceptible difference because the
amplitude of the change is small. In this technique, the embedding capacity can be increased by using two or
more least significant bits. At the same time, not only the risk of making the embedded message statistically
detectable increase but also the image fidelity degrades. Hence a variable size LSB embedding schema is
presented, in which the number of LSBs used for message embedding/extracting depends on the local
characteristics of the pixel. The advantage of LSB-based method is easy to implement and high message pay-
load.
6. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 22 | Page
Although LSB hides the message in such way that the humans do not perceive it, it is still possible for the
opponent to retrieve the message due to the simplicity of the technique. Therefore, malicious people can easily
try to extract the message from the beginning of the image if they are suspicious that there exists secret
information that was embedded in the image.
Therefore, a system named Secure Information Hiding System (SIHS) is proposed to improve the LSB scheme.
It overcomes the sequence-mapping problem by embedding the massage into a set of random pixels, which are
scattered on the cover-image. Masking and filtering techniques, usually restricted to 24 bits and gray scale
image, hide information by marking an image, in a manner similar to paper watermarks. The technique perform
analysis of the image, thus embed the information in significant areas so that the hidden message is more
integral to cover image than just hiding it in the noise level.
Transform techniques embed the message by modulating coefficient in a transform domain, such as the
Discrete Fourier Transform, or Wavelet Transform. These methods hide messages in significant areas of the
cover image, which make them more robust to attack. Transformations can be applied over the entire image, to
block throughout the image, or other variant.
13.1. Image Steganography and bitmap pictures:
Using bitmap pictures for hiding secret information is one of most popular choices for Steganography.
Many types of software built for this purpose, some of these software use password protection to encrypting
information on picture. To use these software you must have a „BMP‟ format of a pictures to use it, but using
other type of pictures like “JPEG”, “GIF” or any other types is rather or never used, because of algorithm of
“BMP” pictures for Steganography is simple. Also we know that in the web most popular of image types are
“JPEG” and other types not “BPM”, so we should have a solution for this problem. This software provide the
solution of this problem, it can accept any type of image to hide information file, but finally it give the only
“BMP” image as an output that has hidden file inside it.
13.2. Bitmap Steganography:
Bitmap type is the simplest type of picture because that it doesn‟t have any technology for decreasing
file size. Structure of these files is that a bitmap image created from pixels that any pixel created from three
colors (Red, Green and Blue said RGB) each color of a pixel is one byte information that shows the density of
that color. Merging these three colors makes every color that we see in these pictures. We know that every byte
in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-
Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our
security information inside BMP pictures. So if we just use last layer (8st layer) of information, we should
change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory
to write our information. But before writing our data we must write name of data (file), size of name of data &
size of data. We can do this by assigning some first bits of memory (8st layer).
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
Using each 3 pixel of picture to save a byte of data Difference between previous and current system graphical
representation is as follows:
XIV. Previous System of Steganography :
Steganography system requires any type of image file and the information or message that is to be
hidden. It has two modules encrypt and decrypt.
Microsoft .Net framework prepares a huge amount of tool and options for programmers that they simples
programming. One of .Net tools for pictures and images is auto-converting most types of pictures to BMP
format. I used this tool in this software called “Steganography” that is written in C#.Net language and you can
use this software to hide your information in any type of pictures without any converting its format to BMP
(software converts inside it).
The algorithm used for Encryption and Decryption in this application provides using several layers lieu of using
only LSB layer of image. Writing data starts from last layer (8st or LSB layer); because significant of this layer
is least and every upper layer has doubled significant from its down layer. So every step we go to upper layer
image quality decreases and image retouching transpires.
The encrypt module is used to hide information into the image; no one can see that information or file. This
module requires any type of image and message and gives the only one image file in destination.
7. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 23 | Page
The decrypt module is used to get the hidden information in an image file. It take the image file as an output,
and give two file at destination folder, one is the same image file and another is the message file that is hidden it
that.
Before encrypting file inside image we must save name and size of file in a definite place of image. We could
save file name before file information in LSB layer and save file size and file name size in most right-down
pixels of image. Writing this information is needed to retrieve file from encrypted image in decryption state. The
graphical representation of this system is as follows:
Figure 2 PREVIOUS SYSTEM OF STEGANOGRAPHY
14.1. Current System of Steganography:
Figure 3 CURRENT SYSTEM OF STEGANOGRAPHY
XV. Limitations of the Software:
This paper has an assumption that is both the sender and receiver must have shared some secret
information before imprisonment. Pure Steganography means that there is none prior information shared by two
communication parties.
XVI. Conclusion:
Steganography is a really interesting subject and outside of the mainstream cryptography and system
administration that most of us deal with day after day. Steganography can be used for hidden communication.
We have explored the limits of Steganography theory and practice. We printed out the enhancement of the
image Steganography system using LSB approach to provide a means of secure communication. A Stego-key
has been applied to the system randomly by system during embedment of the message into the cover image.
Stego-key is only known by receiver than remove the previous system drawback, because pure Steganography
do not share any common information at both end sender and receiver.
This Steganography application software provided for the purpose to how to use any type of image
formats to hiding any type of files inside their. The master work of this application is in supporting any type of
pictures without need to convert to bitmap, and lower limitation on file size to hide, because of using maximum
memory space in pictures to hide the file. Since ancient times, man has found a desire in the ability to
communicate covertly. The recent explosion of research in watermarking to protect intellectual property is
evidence that Steganography is not just limited to military or espionage applications. Steganography, like
cryptography, will play an increasing role in the future of secure communication in the “digital world”.
8. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 24 | Page
References
[1] "Information Hiding: A survey" (pdf). Proceedings of the IEEE (special issue) 87 (7): 1062–78. doi:10.1109/5.771065. Retrieved
2008-09-02.
[2] A New Text Steganography Method By Using Non-Printing Unicode Characters, Akbas E. Ali, Eng. & Tech. Journal, Vol.28,
No.1, 2010
[3] B.r., Roshan Shetty; J., Rohith; V., Mukund; Honwade, Rohan; Rangaswamy, Shanta (2009). Steganography Using Sudoku
Puzzle. pp. 623–626. doi:10.1109/ARTCom.2009.116.
[4] Chvarkova, Iryna; Tsikhanenka, Siarhei; Sadau, Vasili (15 February 2008). "Steganographic Data Embedding Security Schemes
Classification". Steganography: Digital Data Embedding Techniques. Intelligent Systems Scientific Community, Belarus.
Retrieved 25 March 2011.
[5] Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001). Information hiding: steganography and watermarking: attacks and
countermeasures. Springer. ISBN 978-0-7923-7204-2.
[6] Krzysztof Szczypiorski (4 November 2003). "Steganography in TCP/IP Networks. State of the Art and a Proposal of a New
System - HICCUPS". Institute of Telecommunications Seminar. Retrieved 17 June 2010.
[7] Kundur D. and Ahsan K. (April 2003). "Practical Internet Steganography: Data Hiding in IP". Texas Wksp. Security of Information
Systems. Retrieved 16 June 2010.
[8] Vincent Chu. "ASCII Art Steganography".
WEBSITES :
[1] Computer steganography. Theory and practice with Mathcad (Rus) 2006 paper by Konakhovich G. F., Puzyrenko A. Yu.
published in MK-Press Kyiv, Ukraine
[2] Detecting Steganographic Content on the Internet. 2002 paper by Niels Provos and Peter Honeyman published in Proceedings of
the Network and Distributed System Security Symposium (San Diego, CA, February 6–8, 2002). NDSS 2002. Internet Society,
Washington, D.C.
[3] Examples showing images hidden in other images
[4] File Format Extension Through Steganography by Blake W. Ford and Khosrow Kaikhah
[5] Information Hiding: Steganography & Digital Watermarking. Papers and information about steganography and steganalysis
research from 1995 to the present. Includes Steganography Software Wiki list. Dr. Neil F. Johnson.
[6] Steganography at the Open Directory Project
Author’s profile
Author1
(Shubhendu S. Shukla), has completed his MA (Economics) in 2005 and MBA in 2007, and M.Phil
(Management) in 2010. He has done Post Graduated Diploma in Computer Applications from IGNOU and Post
Graduated Diploma in International Business from Annamalai University.
Author is Member of Editorial Board in Reviewer Panel of International Journal of Science and Research (IJSR)
ISSN: 2319-7064 (www.ijsr.net/editorial.php), International Journal of Scientific Engineering and Research
(IJSER) ISSN: 2614-7324 (www.ijser.in/members.php), International Journal of Engineering Research and
Technology (IJERT) ISSN: 2278-0181, ISO 3297:2007 Certified Journal (http://www.ijert.org/about-us/review-
board?start=9), International Journal of Modern Communication Technologies & Research (IJMCTR), ISSN
: 2321-0850, An ISO 9001:2008 certified online journal
http://erpublication.org/IJMCTR/Editorial%20Board.htm), Member of Editorial Board for Research
Journali‟sTM
online journal, Journal of Human Resource (JHR) (http://researchjournali.com/join_editor.php).
He has worked with a prominent IT Company (Wipro Technologies) as Project Manager for e-Governance that
was a Central Govt. Project about e-District, during his job he was responsible for Dealing with Consultant
(Wipro), dealing with Techno team i.e. Trainer and other staff, he also Co-ordinate with District Administrative
staff for monitoring, reporting, and his proposals and finally developed the Study materials.
Author has more than 6 years of experience in academics as he is currently working as Asst professor in SR
Group of Institutions, Lucknow. With the academics author has publish 18 International Research Paper, 12
National Research Papers, attended 9 National Conferences and Seminars, 4 International Seminars. Apart from
SR Group of Institutions, Lucknow, he is Guest and Visiting Faculty of Study Centers of Global Open
University Nagaland, Karnataka State Open University, Sikkim Manipal University, Utter Pradesh Rajarshi
Tandon University.
Author has taught variety of subjects as Marketing, Sales and Distribution, Production and Operation
management, Computer Application in Management, System Analysis & Design and Software Engineering,
Database Management System, Electronic Commerce (Specialized subjects of Information Technology).
Vijay Jaiswal2
has completed B.Tech (Information Technology) in 2009 and perusing M.Tech. Author has
worked with a prominent company (Tata Group) as a Software Engineer for more than 2 year. He has more than
2 years of experience in academics as he is currently working as Asst professor in SR Group of Institutions,
Lucknow, Department of Information Technology. With the academics author has publish 2 International
Research Paper, 3 national Research Papers, attended 2 National Conferences and Seminars, 1 International
Seminars. Apart from SR Group of Institutions, Lucknow, he is Visiting Faculty of Study Centers of Karnataka
State Open University, Sikkim Manipal University. He has taught subjects as Parallel Algorithm, DBMS, Object
Oriented System, Web Technology, and Operating System.
9. Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide
www.iosrjournals.org 25 | Page
Sumeet Gupta3
has completed B.Tech (Computer Science) in 2008 and M.Tech in final stage. Author has more
than 4 years of experience in academics as he is currently working as Asst professor in SR Group of Institutions,
Lucknow, Department of Computer Science. With the academics author has publish 2 International Research
Paper, 3 National Research Papers, attended 2 National Conferences and Seminars, 1 International Seminars.
Apart from SR Group of Institutions, Lucknow, he is Visiting Faculty of Study Centers of Karnataka State Open
University. He has taught subjects as Design Analysis of Algorithm, Compiler, Computer Concepts and
Programming.
Anurag Singh4
has completed B.Tech (Computer Science) in 2008 and M.Tech in final stage. Author has more
than 5 years of experience in academics as he is currently working as Asst professor in SR Group of Institutions,
Lucknow, Department of Computer Science. With the academics author has publish 2 International Research
Paper, 3 National Research Papers, attended 2 National Conferences and Seminars, 1 International Seminars.
Apart from SR Group of Institutions, Lucknow, he is Visiting Faculty of Study Centers of Sikkim Manipal
University. He has taught subjects as Automata, Discreet Mathematics, Graph Theory.